Cisco IOS XR Typhoon-based Line Cards and Network Processor (NP) Chip DoS

This script is (C) 2014 Tenable Network Security, Inc.


Synopsis :

The remote device is missing a vendor-supplied security patch.

Description :

The remote Cisco device is running a version Cisco IOS XR software
that is potentially affected by a denial of service vulnerability
related to Netflow and handling malformed IPv4/IPv6 packets.

Note this issue only affects Cisco ASR 9000 series devices using
Typhoon-based line cards and Netflow.

See also :

http://tools.cisco.com/security/center/viewAlert.x?alertId=35009
http://www.nessus.org/u?036e90f6
https://tools.cisco.com/bugsearch/bug/CSCuo68417

Solution :

Apply the relevant patch referenced in Cisco Bug ID CSCuo68417.

Alternatively, disable Netflow as a workaround.

Risk factor :

Medium / CVSS Base Score : 6.1
(CVSS2#AV:A/AC:L/Au:N/C:N/I:N/A:C)
CVSS Temporal Score : 5.3
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : true

Family: CISCO

Nessus Plugin ID: 76881 ()

Bugtraq ID: 68833

CVE ID: CVE-2014-3322